Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Table of authorized actions for users with limited access to assets

A user with limited access to assets can execute the following actions depending on its role:

  Auditor Security Administrator System Administrator
Generate an export
Consult the Vulnerabilities Encyclopedia
Update the Vulnerabilities Encyclopedia    
Consult the Rules Encyclopedia
Consult the Security Issues
See the vulnerabilities of an asset
Consult the rules status of an asset
Access Kibana (1) (1) (1)
Ignore vulnerabilities on an asset  
Create a deploying/rebooting/scanning policy    
Deploy security fixes on an asset    
Update/Delete an asset    
Assign assets a deploying/rebooting/scanning policy    
Create/Update/Delete a custom compliance repository    
Assign/Remove rules to/from custom compliance repository    
Recheck compliance rules on an asset    
Assign/Remove compliance repositories to/from assets      
Update/Delete a deploying/rebooting/scanning policy      
Create/Update/Delete a Criticality      
Use/Consult Discoveries      
Add agents     (2)
Add agentless connections      
Add Docker images      
Add network targets or websites   (2) (2)
Add air-gapped assets     (2)
Create/Update/Delete stored credentials      
Create/Update/Delete an Ignoring Policy      
Create/Update/Delete a Security Issue      
Create/Update/Delete a custom compliance rule      
Assign groups to assets      
Manage users and rights      

(1) Requires explicit permission.

(2) Requires a group.